/external/mesa3d/src/gallium/drivers/vc4/kernel/ |
D | vc4_validate.c | 48 void *untrusted 126 validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) in validate_bin_pos() argument 131 return (untrusted - 1 == exec->bin_u + pos); in validate_bin_pos() 206 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { in validate_flush() 235 if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { in validate_increment_semaphore() 249 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_indexed_prim_list() 250 uint32_t offset = *(uint32_t *)(untrusted + 5); in validate_indexed_prim_list() 251 uint32_t max_index = *(uint32_t *)(untrusted + 9); in validate_indexed_prim_list() 252 uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; in validate_indexed_prim_list() 284 uint32_t length = *(uint32_t *)(untrusted + 1); in validate_gl_array_primitive() [all …]
|
/external/nanopb-c/docs/ |
D | security.rst | 14 untrusted data. Naturally, if the attacker can modify the contents of a 16 Therefore the application itself must be prepared to receive untrusted values. 23 Division of trusted and untrusted data 36 The following data is regarded as **untrusted**. Invalid/malicious data in 47 untrusted data has been maliciously crafted: 74 checked if they are used with untrusted data.
|
/external/python/cpython2/Doc/library/ |
D | restricted.rst | 15 segregation of trusted and untrusted code. The framework is based on the notion 17 environment) with limited permissions, and run the untrusted code within this 18 cell. The untrusted code cannot break out of its cell, and can only interact 26 interfaces presented to untrusted code usually have the same names as those 31 might be deemed "safe" for untrusted code to read any file within a specified 36 safe "sandbox" area of the filesystem. In this case, the untrusted code would
|
D | xml.dom.pulldom.rst | 22 maliciously constructed data. If you need to parse untrusted or
|
D | xml.rst | 17 constructed data. If you need to parse untrusted or unauthenticated data see 115 untrusted XML data.
|
D | pyclbr.rst | 16 than by importing the module, so this module is safe to use with untrusted
|
D | marshal.rst | 35 untrusted or unauthenticated source.
|
D | xml.sax.rst | 23 constructed data. If you need to parse untrusted or unauthenticated data see
|
/external/wpa_supplicant_8/src/crypto/ |
D | tls_openssl_ocsp.c | 504 STACK_OF(X509) *untrusted = NULL, *certs = NULL, *chain = NULL; in check_ocsp_resp() 565 untrusted = sk_X509_dup(basic->certs); in check_ocsp_resp() 566 if (!untrusted) in check_ocsp_resp() 579 if (!sk_X509_push(untrusted, extra_cert)) { in check_ocsp_resp() 618 signer = ocsp_find_signer(untrusted, rd->responderID); in check_ocsp_resp() 646 if (!X509_STORE_CTX_init(&ctx, store, signer, untrusted)) in check_ocsp_resp() 838 sk_X509_free(untrusted); in check_ocsp_resp()
|
/external/tcpdump/tests/ |
D | cdp-v.out | 16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 54 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
|
D | lldp_cdp-ev.out | 16 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 35 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 142 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00 161 AVVID untrusted ports CoS (0x13), value length: 1 byte: 0x00
|
/external/modp_b64/ |
D | modp_b64_nacl.gyp | 7 '../../native_client/build/untrusted.gypi',
|
/external/libchrome/crypto/ |
D | crypto_nacl.gyp | 10 '../native_client/build/untrusted.gypi',
|
/external/regex-re2/re2/testing/ |
D | tester.cc | 82 bool untrusted; // don't really trust the answer member 429 result->untrusted = true; in RunSearch() 515 if (!r.untrusted) in RunCase() 518 LogMatch(r.untrusted ? "(Untrusted) Mismatch: " : "Mismatch: ", i, text, in RunCase()
|
/external/libyuv/files/ |
D | libyuv_nacl.gyp | 12 '../../native_client/build/untrusted.gypi',
|
/external/owasp/sanitizer/lib/guava-libraries/ |
D | README | 41 untrusted code.
|
/external/guava/ |
D | README | 41 untrusted code.
|
/external/clang/include/clang/AST/ |
D | CommentHTMLTags.td | 56 // output if the input is untrusted.
|
/external/boringssl/src/crypto/x509/ |
D | x509_vfy.c | 225 if (ctx->untrusted != NULL in X509_verify_cert() 226 && (sktmp = sk_X509_dup(ctx->untrusted)) == NULL) { in X509_verify_cert() 1268 for (i = 0; i < sk_X509_num(ctx->untrusted); i++) { in crl_akid_check() 1269 crl_issuer = sk_X509_value(ctx->untrusted, i); in crl_akid_check() 1305 if (!X509_STORE_CTX_init(&crl_ctx, ctx->ctx, x, ctx->untrusted)) in check_crl_path() 2177 ctx->untrusted = sk; in X509_STORE_CTX_set_chain() 2278 ctx->untrusted = chain; in X509_STORE_CTX_init()
|
D | x509_lu.c | 408 STACK_OF(X509) *untrusted) { in X509_STORE_set0_additional_untrusted() 409 ctx->additional_untrusted = untrusted; in X509_STORE_set0_additional_untrusted()
|
/external/boringssl/src/include/openssl/ |
D | x509_vfy.h | 220 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 440 X509_STORE *ctx, STACK_OF(X509) *untrusted);
|
/external/wpa_supplicant_8/hs20/server/ca/ |
D | setup.sh | 207 $OPENSSL verify -CAfile rootCA/cacert.pem -untrusted demoCA/cacert.pem *.pem
|
/external/openssh/ |
D | PROTOCOL.krl | 165 Implementations that retrieve KRLs over untrusted channels must verify
|
/external/tcpdump/ |
D | INSTALL.txt | 22 man page for details. DO NOT give untrusted users the ability to
|
/external/markdown/docs/ |
D | using_as_module.txt | 103 by untrusted users, you may want to use the "safe_mode" option which ensures
|